answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
2 years ago
8

To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuat

ions, a(n) ____, which contains a built-in battery, can be used.
Computers and Technology
2 answers:
pickupchik [31]2 years ago
8 0

To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuations, an <u>uninterruptible power supply (UPS)</u>, which contains a built-in battery, can be used.

<u>Explanation</u>:

An uninterruptible power supply (UPS) is a device that allows a computer or server powered up for a short time, when the electricity goes off. UPS device also provides uninterrupted service during power fluctuation.

A battery is inbuilt in the UPS and provides power for few minutes to the computer to shut down it in a proper manner.

UPS is available at affordable cost and can be maintained at low cost compared to generators.

Studentka2010 [4]2 years ago
3 0

To keep a desktop computer or a server powered up when the electricity goes off in addition to protection against power fluctuations, an UPS, which contains a built-in battery, can be used.

<h3><u>Explanation:</u></h3>

An uninterruptible power supply (UPS) is a thing that enables a computer to continue working for at least a little time when the prime power source is dropped. UPS devices also shield from power breakers.

A UPS comprises a battery that "potencies in" when the machine senses a loss of potential from the primary source.  When all power drops out, any data in your computer's random access memory is eradicated. When power breakers transpire, a UPS prevents the surge so that it does not corrupt the computer.

You might be interested in
What is retrieved from a search containing two terms separated<br> by the AND operator?
egoroff_w [7]

Answer:

A AND B= 1 or 0

1 1  1

0 1  0

1 0  0

0 0 0

So, as explained above if both are 1 we then only get 1, or else we get 0 always in case of AND which is a logical operator, whose output can be 0 or 1 only. This is being depicted above.

Explanation:

If both are 1 we get 1 or always else, we get the output =0.

8 0
2 years ago
Allison wants to use equations to simplify the process of explaining something to the Sales team, but the default eq
yarga [219]

Answer:

Search for something that fits her needs

Explanation:

There are several approaches to problem solving, the approach that will be employed depends on our definition of the problem. Not all processes can be modeled by mathematical equations, some processes are simply theoretical and can be explained by simple logic.

If Allison does not find the needed equations among the available default equations, she can come up with an equation that addresses the process at hand. If she cannot come up with any, she can use other approaches that fit her needs to explain the required concept to the team.

7 0
2 years ago
Read 2 more answers
Create a single list that contains the following collection of data in the order provided:
ivann1987 [24]

Answer:

A code was created to single list that contains the following collection of data in the order provided

Explanation:

Solution

#list that stores employee numbers

employeee_numbers=[1121,1122,1127,1132,1137,1138,1152,1157]

#list that stores employee names

employee_name=["Jackie Grainger","Jignesh Thrakkar","Dion Green","Jacob Gerber","Sarah Sanderson","Brandon Heck","David Toma","Charles King"]

#list that stores wages per hour employee

hourly_rate=[22.22,25.25,28.75,24.32,23.45,25.84,22.65,23.75]

#list that stores salary employee

company_raises=[]

max_value=0

#list used to store total_hourly_rate

total_hourly_rate=[]

underpaid_salaries=[]

#loop used to musltiply values in hourly_wages with 1.3

#and store in new list called total_hourly_rate

#len() is used to get length of list

for i in range(0,len(hourly_rate)):

#append value to the list total_hourly_rate

total_hourly_rate.append(hourly_rate[i]*1.3)

for i in range(0,len(total_hourly_rate)):

#finds the maximum value

if(total_hourly_rate[i]>max_value):

max_value=total_hourly_rate[i] #stores the maximum value

if(max_value>37.30):

print("\nSomeone's salary may be a budget concern.\n")

for i in range(0,len(total_hourly_rate)):

#check anyone's total_hourly_rate is between 28.15 and 30.65

if(total_hourly_rate[i]>=28.15 and total_hourly_rate[i]<=28.15):

underpaid_salaries.append(total_hourly_rate[i])

for i in range(0,len(hourly_rate)):

#check anyone's hourly_rate is between 22 and 24

if(hourly_rate[i]>22 and hourly_rate[i]<24):

#adding 5%

hourly_rate[i]+=((hourly_rate[i]/100)*5)

elif(hourly_rate[i]>24 and hourly_rate[i]<26):

#adding 4%

hourly_rate[i]+=((hourly_rate[i]/100)*4)

elif(hourly_rate[i]>26 and hourly_rate[i]<28):

#adding 3%

hourly_rate[i]+=((hourly_rate[i]/100)*3)

else:

#adding 2% for all other salaries

hourly_rate[i]+=((hourly_rate[i]/100)*2)

#adding all raised value to company_raises

company_raises.extend(hourly_rate)

#The comparison in single line

for i in range(0,len(hourly_rate)):

 For this exercise i used ternary

operator hourly_rate[i]= (hourly_rate[i]+((hourly_rate[i]/100)*5)) if (hourly_rate[i]>22 and hourly_rate[i]<24) else (hourly_rate[i]+((hourly_rate[i]/100)*4)) if (hourly_rate[i]>24 and hourly_rate[i]<26) else hourly_rate[i]+((hourly_rate[i]/100)*2)

8 0
2 years ago
A(n) key is the set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the messag
a_sh-v [17]

Answer:

Algorithm

Explanation:

Algorithm is a set of instructions designed to perform a specific task, an independent sequence of actions to be perform to solve a problem and instruction for performing a computation.

Algorithm is A(n) key set of steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message; it sometimes refers to the programs that enable the cryptographic processes.

5 0
2 years ago
Read 2 more answers
5.15 LAB: Output values below an amount Write a program that first gets a list of integers from input. The input begins with an
IgorC [24]

Answer:

# the terminal display waiting for the user to enter the input

# the received input is assigned to user_input

user_input = input()

# the user_input is splitted based on space and is assigned to integerlist

integerlist = user_input.split(" ")

# the last element in the integerlist is assigned as threshold

threshold = int(integerlist[len(integerlist) - 1])

# a for loop that loop from index 1 to second to the last element in the list

# the loop compare each element with the threshold

# if element is less than threshold, it is displayed

# the loop start from index 1 because index 0 represent number of element

for i in range(1, (len(integerlist) - 1)):

       if int(integerlist[i]) < threshold:

           print(integerlist[i], sep="")

Explanation:

The program is written in Python and well commented.

An sample of program output when it is executed is attached.

5 0
2 years ago
Read 2 more answers
Other questions:
  • Suppose the algorithms used to implement the operations at layer k is changed. how does this impact services at layers k-1 and k
    10·1 answer
  • What is the formula equivalent to the function =SUM(B1:B5)?
    11·2 answers
  • When performing actions between your computer and one that is infected with a virus which of the following offers no risk becomi
    5·1 answer
  • Which of the following blocks is least similar to the others?
    8·2 answers
  • Write a algorithm to attend birthday party​
    8·2 answers
  • In Section 8.5.4, we described a situation in which we prevent deadlock by ensuring that all locks are acquired in a certain ord
    11·1 answer
  • You have an on-premises network that contains several servers. You plan to migrate all the servers to Azure. You need to recomme
    14·1 answer
  • 1⁰=?<br> Is equal to...........
    12·2 answers
  • Suspicious activity, like IP addresses or ports being scanned sequentially, is a sign of which type of attack?
    7·1 answer
  • In a particular field, there are trees in a l single row from left to right. Each tree has a value V You cut trees from left to
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!